Why There’s No Time Like The Present For Zero Trust Security

by | Nov 29, 2021 | Thought leadership

The volume and sophistication of ransomware attacks has exploded and will only continue to increase next year, when we can expect more personalized attacks from criminals with a broader understanding of how organizations work on the inside.

The issue is becoming increasingly costly with a recent US Treasury report estimating that suspected ransomware payments reported during the first half of this year reached $590 million. In contrast, the level of suspected payments reported during all of 2020 was $416 million.

Clearly, the ‘revenue’ brought in by cybercriminals has further energized their efforts. At the same time, the huge shift to remote working has broadened the attack vector and encouraged attackers to target more people, more often.

As a result, an overarching zero trust approach is fast becoming essential if businesses and government agencies are to take the proactive protection of networks and critical infrastructure to the next level.

In practical terms, zero trust security sees the world differently from other approaches to cybersecurity. No one is trusted by default, regardless of whether they are inside or outside a network because without it, organizations run the risk of attackers having a free reign across a network once they are inside.

Targeting the Supply Chain

Take the IT supply chain ecosystem, for example – a key component of the industry that is once again under pressure from cybercriminals looking to exploit ongoing weaknesses. In recent weeks, Microsoft publicly warned its resellers and managed service providers that ‘Nobelium’ – the group thought to be behind the SolarWinds attack – was now targeting its global supply chain.

With Nobelium surveying global organizations for vulnerabilities, improving security infrastructure is now absolutely critical. According to Microsoft researchers, the nation-state adversaries are not leveraging specific vulnerabilities at this time but are using old school credential stuffing and phishing as well as API abuse and token theft in order to gather legitimate account credentials. 

If successful, lateral movement across the compromised organization’s network would be the next stage, allowing for data theft, reconnaissance, compromise of customer systems and more.

Recent attacks and these new attempts to target major networks demonstrate that eliminating trust by default, whether within or outside a network, is quickly becoming a must-have for businesses looking to build a strong defence. In a world where data may be stored across different cloud providers, it’s critical to tighten all access verification methods.

Adding a Content Disarm and Reconstruction (CDR) capability to the cybersecurity stack plays a vital role in a rounded zero trust cybersecurity strategy, particularly in the fight against malicious file uploads. As recently highlighted by Gartner® , “Restrict the file types to the minimum required. For allowed file types, there are essentially four options to limit the risk of malware upload: CDR provides the highest security.  Done well, CDR removes all threats from uploaded files without adding significant latency. Since it does not depend on the detection of known threats, it can even protect against completely new attack types.”

To learn more about how Glasswall Content Disarm and Reconstruction solutions can help organizations deliver an effective zero trust strategy, click here.

—-

Source: Gartner, Quick Answer: Protect Web Applications Against Malicious File Uploads, Mario de Boer, 8 October 2021

Gartner is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved

Related

What are file-based threats?

What is zero-trust file protection?

How does Glasswall CDR work?

Picture of a knight mask with swords to illustrate our battle for being the market leader in CDR

Glasswall vs Competitors

Why Glasswall CDR?

Learn about the simple way to protect against sophisticated file-based threats.

All resources

Blog

Datasheets

Case Studies

Use Cases

Whitepapers

Videos

Events

Product help

Documentation

Demos

Contact us

Support

strategic alliances

About our Partner Program

Our Partners

Become a Partner

Glasswall partner program

Bringing File-based threat protection to your customers

Offer a richer security portfolio with the most agile CDR platform on the market. Stand out from the competition with a partner program built for you. Let’s make files safer together.

About Glasswall

Our People

Careers

Patents

communication

Contact Us

support lines

Support

Raising the bar on file security

We believe people should be free to open their files without fear. To click on anything without risk of catastrophe. To use systems the way they were meant to be used. That’s why we’re raising the bar on file security at Glasswall.